Static task
static1
Behavioral task
behavioral1
Sample
743476e37608f6150e1065641375274e6ce695a505c51fa012c3279eeaf4a8f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
743476e37608f6150e1065641375274e6ce695a505c51fa012c3279eeaf4a8f3.exe
Resource
win10v2004-20231222-en
General
-
Target
ransomtuga_nondebug_14340466571.zip
-
Size
111KB
-
MD5
880732574fd5f27d604a7dfef971f945
-
SHA1
97b4cc85c16c026f042218405162d4f29b4cf8c3
-
SHA256
39257162aea07687b3f14f1ecd816a22f043beb83d6b08b32dae2a88ffe0e4e2
-
SHA512
a9c37c9c4d2556d035b8b1afe6097c2427d23981d9e7c8e0db26fb2995e027680608535dcb41b370d4e40552419c4789eb493056aba57ca70fbf7decd528230d
-
SSDEEP
3072:PLEt+oJXehkHTT/rQeHn541kvtnZ+8cBuK002b0Ezq7Pyd:zEt+oJBTT/EeZ4yJZRcy1bqLyd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/743476e37608f6150e1065641375274e6ce695a505c51fa012c3279eeaf4a8f3
Files
-
ransomtuga_nondebug_14340466571.zip.zip
Password: infected
-
743476e37608f6150e1065641375274e6ce695a505c51fa012c3279eeaf4a8f3.exe windows:6 windows x64 arch:x64
8bd5448451f53b8a28838346c489dcbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
InitializeCriticalSectionEx
GetLastError
DeleteCriticalSection
SystemTimeToFileTime
GetSystemTime
CreateMutexA
Sleep
CreateThread
GetConsoleWindow
OutputDebugStringW
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetProcAddress
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
CloseHandle
InitializeSListHead
QueryPerformanceCounter
user32
ShowWindow
msvcp140
?set_new_handler@std@@YAP6AXXZP6AXXZ@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?uncaught_exception@std@@YA_NXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
_Xtime_get_ticks
_Query_perf_counter
_Thrd_sleep
_Query_perf_frequency
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
memmove
memcpy
_CxxThrowException
__std_terminate
_purecall
__std_type_info_compare
__std_exception_copy
memcmp
__std_exception_destroy
__current_exception_context
__current_exception
__C_specific_handler
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
_aligned_free
_aligned_malloc
_set_new_mode
free
api-ms-win-crt-runtime-l1-1-0
_exit
_errno
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_narrow_environment
_getpid
_set_app_type
_seh_filter_exe
_invalid_parameter_noinfo
terminate
system
_cexit
_initterm_e
_crt_atexit
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_configure_narrow_argv
exit
_initialize_narrow_environment
_initialize_onexit_table
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-stdio-l1-1-0
__p__commode
fgets
feof
_popen
_pclose
_set_fmode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ